General

  • Target

    2024-04-11_9d72d4364c7bbb4ae3e13aa48fd1b53e_cryptolocker

  • Size

    48KB

  • MD5

    9d72d4364c7bbb4ae3e13aa48fd1b53e

  • SHA1

    c075c124bfff318b09c9c2d041498ff536332b0f

  • SHA256

    d381b8d172092fa858f711fb0cb5ab326021719da6b2782cd45e7923bfef97c1

  • SHA512

    4e8c0ab2faa6a324a11238c2cae0c0e75423a350328c32b28d262bfd975ee15b5d0765e822b95d077a46c6a28dc1eea978a53b5c54ce7a37466ae0af4266ca25

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9RzhwaN4PP:xj+VGMOtEvwDpjy+TN4n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_9d72d4364c7bbb4ae3e13aa48fd1b53e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections